Wireless Encryption Protocols Flashcards

1
Q

802.11i

A

IEEE security standard for 802.11 wireless networks. It introduced robust enhancements such as WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WEP (Wired Equivalent Privacy)

A

WEP is an early encryption protocol for Wi-Fi using the RC4 stream cipher for confidentiality and a CRC-32 checksum for data integrity. It provides basic encryption but is highly vulnerable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

EAP (Extensible Authentication Protocol)

A

EAP is an authentication framework, that allows for various methods such as token cards, certificates, or username/password. It is commonly used in enterprise wireless networks with RADIUS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

LEAP (Lightweight EAP)

A

LEAP is a proprietary EAP method developed by Cisco. It uses dynamic WEP keys and username/password for authentication, has largely been deprecated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WPA (Wi-Fi Protected Access)

A

WPA was a transitional security protocol using TKIP and a 48-bit IV. It added message integrity checks (MIC) and dynamic key changes but retained use of RC4, making it more secure than WEP but still vulnerable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TKIP (Temporal Key Integrity Protocol)

A

TKIP was introduced with WPA to improve WEP. It includes per-packet key mixing, a 48-bit IV, and a MIC (Message Integrity Code), but remains weaker than AES and is considered deprecated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WPA2

A

WPA2 replaces TKIP with AES for encryption and uses CCMP for integrity. It’s based on the full 802.11i standard, offering stronger security, especially in enterprise settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AES (Advanced Encryption Standard)

A

AES is a symmetric block cipher using key sizes of 128, 192, or 256 bits. In WPA2, it provides robust encryption when paired with CCMP, replacing the weaker RC4 used in WEP/WPA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CCMP (Counter Mode CBC-MAC Protocol)

A

CCMP is the encryption and integrity protocol used with AES in WPA2. It provides confidentiality via counter mode and integrity through CBC-MAC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WPA2 Enterprise

A

WPA2 Enterprise combines WPA2 encryption with EAP-based authentication using a RADIUS server. It provides individual credentials per user, enabling better access control and auditability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RADIUS (Remote Authentication Dial-In User Service)

A

RADIUS is a centralized AAA (Authentication, Authorization, Accounting) server used in enterprise networks to authenticate users (typically with EAP) and manage access to network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PEAP (Protected EAP)

A

PEAP encapsulates EAP messages within a secure TLS tunnel, providing encryption of the authentication exchange, preventing eavesdropping and man-in-the-middle attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WPA3 Enterprise

A

WPA3 Enterprise offers the highest level of wireless security, using 256-bit GCM (Galois/Counter Mode) for encryption and HMAC-SHA-384 for authentication. It ensures forward secrecy and stronger cryptographic protections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Main Advantages of WEP

A

WEP aimed to provide confidentiality (via RC4 encryption), access control (via shared key), and data integrity (via CRC-32), but all mechanisms are now considered insecure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WPA3 Personal

A

WPA3 Personal uses Simultaneous Authentication of Equals (SAE) instead of PSK, offering protection against dictionary attacks, forward secrecy, and key recovery resistance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Improvements in WPA3 over WPA2

A
  • Secure handshake (SAE replaces PSK)\n- Wi-Fi Easy Connect for simplified IoT onboarding\n- Larger session keys\n- Support for unauthenticated encryption for open networks (OWE)
17
Q

WEP Issues

A
  • Plaintext IVs sent in cleartext\n- Vulnerable to passive data collection and key recovery\n- Susceptible to replay and brute-force attacks\n- Weak checksum (CRC-32) allows for integrity bypass
18
Q

WPA Issues

A
  • Susceptible to eavesdropping and packet spoofing\n- TKIP vulnerable to IP discovery and ARP attacks\n- Weak MIC susceptible to forgery\n- GTK (Group Temporal Key) discovery attacks
19
Q

WPA2 Issues

A
  • Dictionary attacks on pre-shared key (PSK)\n- KRACK (Key Reinstallation Attacks) exploit handshake flaws\n- Insecure WPS PIN brute-forcing\n- Group key exposure (GTK)\n- Susceptibility to DoS and MITM attacks